The Cybersecurity Regulatory Framework (CRF) for Service Providers in the Information and Communications Technology Sector, established in the Kingdom of Saudi Arabia (KSA) by the Communications, Space & Technology Commission (CST) – previously CITC, is a comprehensive regulatory framework designed to enhance cybersecurity and resilience across the Information and Communications Technology (ICT) sector. This framework aims to provide guidelines and best practices for organisations to protect critical infrastructure and sensitive data from cyber threats, thus increasing the trust in safe and resilient ICT infrastructure and services. Organisations are required to fulfil the relevant requirements and perform an audit of compliance.
The CRF consists of three compliance levels (CL1, CL2, CL3) following a risk-based approach. Each level varies in the complexity of controls to ensure higher levels are achieved with time.
Level 1: CL1 – Includes the basic security controls
Level 2: CL2 – Includes advanced requirements
Level 3: CL3 – Includes requirements that are focusing on efficiency monitoring and continuous improvement to the controls in Levels 1 and 2.
Our approach to support the preparation for the CRF compliance audit follows a thorough assessment of the KSA Cybersecurity Regulatory Framework (CRF) to determine its compliance requirements relative to the organisation. We collaborate closely with relevant teams to evaluate the current cybersecurity posture and identify any compliance gaps.
This process enables us to develop a robust action plan that addresses these gaps while adhering to industry best practices. Our goal is to ensure not only compliance with the CRF but also the enhancement of the organisation’s overall cybersecurity resilience.
Our Methodology
Understanding the context of the organisation
comprehensive analysis of the organisation’s structure, operations, and specific cybersecurity needs to tailor the approach effectively.
Perform a gap analysis
A detailed gap analysis is performed to evaluate the organisation’s current cybersecurity practices against the compliance levels specified in the Cybersecurity Regulatory Framework (CRF). This step identifies areas that require improvement.
Develop a remediation plan
Based on the findings from the gap analysis, a strategic plan is created that is aimed at addressing identified gaps. This plan outlines specific actions, timelines, and resources needed to achieve compliance.
Documentation and Implementation
Assistance with implementing the remediation plan by developing the necessary documentation, including cybersecurity strategies, risk management, asset management, change management, project management, incident management, cybersecurity in human resources, policies, procedures, and awareness & training materials that align with the CRF requirements.
Facilitate Implementation Support
Provide ongoing support throughout the implementation process, ensuring that the organisation is equipped to execute the plan effectively and efficiently.
Assist in closing findings
Work collaboratively with the organisation to address any outstanding findings, ensuring that all compliance requirements are met and that best practices in cybersecurity are firmly established.

Sysprove has successfully supported numerous organisations to identify and close compliance gaps in alignment with the Cybersecurity Regulatory Framework (CRF). Through our tailored approach, we have enabled organisations to enhance their cybersecurity postures and achieve compliance. By developing customised remediation plans and providing ongoing support, we ensure not only meeting the regulatory requirements but also adopting best practices in cybersecurity.
For details on the Cybersecurity Regulatory Framework (CRF) refer to the latest CRF released version by CST.